General

  • Target

    2024-05-11_c830b7bd4c0a7e40d5fcd23ec2fb6cef_cryptolocker

  • Size

    63KB

  • MD5

    c830b7bd4c0a7e40d5fcd23ec2fb6cef

  • SHA1

    96c94b3278ea80488cdf9ff4b12c88123cd2c355

  • SHA256

    170b8aac55c4b586d570b01f116dc36224f8246d5c1e896b2cdce330ec81619b

  • SHA512

    5b406ed4a3a2e79a29302fbe35b4623add90308ca66bd06fd79135f903701a58b447fc2e46a023fbcac89362f338a97fb85a5346104774aef2069765f2f5db08

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi+:BbdDmjr+OtEvwDpjM8z

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_c830b7bd4c0a7e40d5fcd23ec2fb6cef_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections